Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe
Resource
win10v2004-20220812-en
General
-
Target
f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe
-
Size
183KB
-
MD5
87179f18e54469aea03570f9f070622e
-
SHA1
4587b07d08776058f6584bb2b0324661e9441dbe
-
SHA256
f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f
-
SHA512
07239b807c872a00be07e69e30b716d362d3b51d137abf2dc355e00f93e25aef4aeada08f75694b51d32a4776e449738345112d09b5facf8b60718f551b0331d
-
SSDEEP
3072:A8vh9nRFlQDvfQ2IE8DTVNIfdyMNxkWKXFevcfOLg8MOR2yVPpD+E9Al:A8bdQDvfQnbCkWKXF0Lg8UyVP5+
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1420 f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe 1420 f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe 1420 f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1420 f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1420 f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2244 1420 f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe 80 PID 1420 wrote to memory of 2244 1420 f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe"C:\Users\Admin\AppData\Local\Temp\f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:2244
-